Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
5dd8bbc2a06f32e7ae85158d378bf1c6ca1a03c766d36a350329958f02a77ffd.dll
Resource
win7-20240729-en
General
-
Target
5dd8bbc2a06f32e7ae85158d378bf1c6ca1a03c766d36a350329958f02a77ffd.dll
-
Size
1.2MB
-
MD5
add78f4a51bc5a019c357ceb81094996
-
SHA1
1d908cdabfa232ac577ed7ad302a4e774aa472e0
-
SHA256
5dd8bbc2a06f32e7ae85158d378bf1c6ca1a03c766d36a350329958f02a77ffd
-
SHA512
83b3429bc0871d28c48db7db15d44fe65e7b02fa9609fd9b357f571059c466743fa355b88163e48d36c7e9c8f16ff03080781feb282a5770d51c8bf5ba545298
-
SSDEEP
12288:hPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8xy:htKTrsKSKBTSb6DUXWq8x
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1244-4-0x0000000002540000-0x0000000002541000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2636-0-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral1/memory/1244-24-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral1/memory/1244-36-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral1/memory/1244-35-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral1/memory/2636-44-0x0000000140000000-0x0000000140130000-memory.dmp dridex_payload behavioral1/memory/2184-54-0x0000000140000000-0x0000000140131000-memory.dmp dridex_payload behavioral1/memory/2184-58-0x0000000140000000-0x0000000140131000-memory.dmp dridex_payload behavioral1/memory/2232-71-0x0000000140000000-0x0000000140132000-memory.dmp dridex_payload behavioral1/memory/2232-75-0x0000000140000000-0x0000000140132000-memory.dmp dridex_payload behavioral1/memory/2904-87-0x0000000140000000-0x0000000140137000-memory.dmp dridex_payload behavioral1/memory/2904-91-0x0000000140000000-0x0000000140137000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2184 SystemPropertiesProtection.exe 2232 dpnsvr.exe 2904 FXSCOVER.exe -
Loads dropped DLL 7 IoCs
pid Process 1244 Process not Found 2184 SystemPropertiesProtection.exe 1244 Process not Found 2232 dpnsvr.exe 1244 Process not Found 2904 FXSCOVER.exe 1244 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\MAINTE~1\\KTT115~1\\dpnsvr.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesProtection.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpnsvr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2636 rundll32.exe 2636 rundll32.exe 2636 rundll32.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3008 1244 Process not Found 30 PID 1244 wrote to memory of 3008 1244 Process not Found 30 PID 1244 wrote to memory of 3008 1244 Process not Found 30 PID 1244 wrote to memory of 2184 1244 Process not Found 31 PID 1244 wrote to memory of 2184 1244 Process not Found 31 PID 1244 wrote to memory of 2184 1244 Process not Found 31 PID 1244 wrote to memory of 2192 1244 Process not Found 32 PID 1244 wrote to memory of 2192 1244 Process not Found 32 PID 1244 wrote to memory of 2192 1244 Process not Found 32 PID 1244 wrote to memory of 2232 1244 Process not Found 33 PID 1244 wrote to memory of 2232 1244 Process not Found 33 PID 1244 wrote to memory of 2232 1244 Process not Found 33 PID 1244 wrote to memory of 2728 1244 Process not Found 34 PID 1244 wrote to memory of 2728 1244 Process not Found 34 PID 1244 wrote to memory of 2728 1244 Process not Found 34 PID 1244 wrote to memory of 2904 1244 Process not Found 35 PID 1244 wrote to memory of 2904 1244 Process not Found 35 PID 1244 wrote to memory of 2904 1244 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5dd8bbc2a06f32e7ae85158d378bf1c6ca1a03c766d36a350329958f02a77ffd.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
C:\Windows\system32\SystemPropertiesProtection.exeC:\Windows\system32\SystemPropertiesProtection.exe1⤵PID:3008
-
C:\Users\Admin\AppData\Local\sRiWA\SystemPropertiesProtection.exeC:\Users\Admin\AppData\Local\sRiWA\SystemPropertiesProtection.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2184
-
C:\Windows\system32\dpnsvr.exeC:\Windows\system32\dpnsvr.exe1⤵PID:2192
-
C:\Users\Admin\AppData\Local\KkxPkRK0r\dpnsvr.exeC:\Users\Admin\AppData\Local\KkxPkRK0r\dpnsvr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2232
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:2728
-
C:\Users\Admin\AppData\Local\QsZqTr\FXSCOVER.exeC:\Users\Admin\AppData\Local\QsZqTr\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD502cdc5b48ca893ade72a878904f0c49f
SHA1a442fa2149c046dbf45189062067ba495e002cb7
SHA25637a8785d050d6fce98d6e2dc5b9dad47270bd929d8f4c2703686fd97f25b8d0a
SHA5121faf7853b7987e92e35490684c743401977d4b5977e06fa4f8e98afa8fa7ca167db1e82e5efc84f57062b0094bb667b535577c7919daeb818ecc6fd37a5189ba
-
Filesize
1.2MB
MD5a1fe661256b5c703a932b68c50cc3f28
SHA1f641aabacacf1e91dd387e5b2ebcfedee715623a
SHA256c8a7c8b6e054cd2efede95d27df480507533f8d221455c12364e88cb9182ea10
SHA5122ba4849716522481d2e136cde5235c172e3c2ad0d376f1982177d4cbc692806a7df8eccee1bd181ad2e1660cb1f2259eaaf8828d196c4fa190c3f6cdb0ba4b30
-
Filesize
1.2MB
MD554c487210112904e1f9faa18c70948be
SHA11b42c4487a1a980ab11ceeccb746fd18778cfe4a
SHA256bbc3c55093763c28f24102ea5d996c72797f8133d281a314aa772d32b65b8fde
SHA51234a82c55097b93324f29352ec3f43a7827f1bb7b4b48d3f74a2f0bcc87ed93712721362282db6eb8dc96541e98fd2dfb787fd69274ad1c9d600dcc2b8d799976
-
Filesize
1KB
MD53e38d98ce01d0b8d79365eb440511ca2
SHA1faac09f93016350ef3b6d85e08d499b1995dee4e
SHA256bc977d4aef4cb6dda5045691e55ef1e6818852aa0ed5dc60ed30c3b2f422050e
SHA512e99814fd57df99c31a05973d5fef71e0b50d9279f9dcc9d4a749d35b1f4294f5ba2d8e1516fd477490a0480fd2c3b0de62090dee048cc724342f7cce238317bb
-
Filesize
33KB
MD56806b72978f6bd27aef57899be68b93b
SHA1713c246d0b0b8dcc298afaed4f62aed82789951c
SHA2563485ee4159c5f9e4ed9dd06e668d1e04148154ff40327a9ccb591e8c5a79958c
SHA51243c942358b2e949751149ecc4be5ff6cb0634957ff1128ad5e6051e83379fb5643100cae2f6ef3eaf36aff016063c150e93297aa866e780d0e4d51656a251c7b
-
Filesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
Filesize
80KB
MD505138d8f952d3fff1362f7c50158bc38
SHA1780bc59fcddf06a7494d09771b8340acffdcc720
SHA256753a43d8aa74341d06582bd6b3784dc5f8c6f46174c2a306cf284de238a9c6bd
SHA51227fa8c0af3d01f0816852d04693087f3c25d1307d8857a7ea75b0bb3e0ac927d262f5ac5a335afee150142fa3187354d33ebbcf6c3cd5cc33cb4e6cd00c50255